J2EE Instrumentation for software aging root cause application component determination with AspectJ
|
|
- Wendy Bradley
- 5 years ago
- Views:
Transcription
1 J2EE Instrumentation for software aging root cause application component determination with AspectJ Javier Alonso Josep Ll. Berral Ricard Gavaldà Jordi Torres Technical University of Catalonia, Spain
2 Contents Motivation Our Contribution Preliminary concepts Architecture Root cause determination strategy Experimental Case Study Conclusion & Future work
3 Motivation New challenges are demanded by the society. Availability of the information At any time From everywhere Becoming in growing complexity day by day.
4 Motivation The growing complexity causes: Necessity for brilliant IT professionals. Increment of the Total owner Cost of the IT infrastructures. Increment of the faults/outages due to (directly or indirectly) the complexity.
5 Motivation These faults/outages have an important impact of the revenue of the companies: Around US$125,000 per hour, direct impact A part of the indirect impact Several studies show that the current system outages are more often due to software faults.
6 Motivation: Software Aging One of the most important reasons for software failures is the software aging phenomenon. The software aging Accumulation of errors, usually provoking resource contention during long running application Gradual performance degradation could also accompany software aging phenomena.
7 Motivation: Software Aging Software aging related with: Memory bloating/leaks Unterminated threads Data corruption Unreleased file-locks Overruns Potentially some of them together
8 Motivation: Software Aging The applications have to deal with software aging in production stage. The unaffordable and hardly cost task to avoid all software bugs. What is it the solution? Software rejuvenation
9 Motivation: Software Rejuvenation Software rejuvenation Basically, reboot the system, although there are most sophisticated techniques like microrebooting. There are two main strategies: Time based strategy. Proactive based strategy.
10 Motivation: Software Rejuvenation Time based strategies: Rejuvenation is applied regularly and periodically. Well-known used in web servers. Proactive based strategies: System metrics are monitored continuously The rejuvenation action is triggered when the system is near to the crash according to the system metrics.
11 Motivation: Software Rejuvenation The proactive approach is better because: We can reduce the rejuvenation actions The effectiveness of the proactive approach depends on the accuracy of the monitoring metrics.
12 Motivation: Root cause rejuvenation However, traditional monitoring tools understand the applications as black boxes. This fact makes impossible to know what the root cause of the software aging is. We understand as root cause the system component/s causing of the software aging.
13 Motivation: Root cause rejuvenation Monitoring tools do not offer enough clues about the root cause of failure. The most used rejuvenation mechanisms are based on rebooting or application restarting. Rebooting implies also a reduction of availability New more accurate techniques are proposed to reduce the Mean Time to Repair (MTTR), increasing the Availability. Availability =. MTTF. MTTF + MTTR
14 Motivation: Root cause rejuvenation Micro Rebooting Apply the recovery technique only over the component of the application that causes the failure. However, this technique needs a monitoring tool or detection mechanism that allow us to determinate the root cause of the failure.
15 Our Contribution We present a monitoring framework to help to determine the root cause of the software aging phenomena. Using technologies: Aspect Oriented Programming (AOP) Java Management Extensions (JMX) For J2EE infrastructures.
16 Our Contribution The idea: Monitoring the resources consumed by every software component of a J2EE application Monitoring the trend of the consumption Allowing to build a resource-component consumption map. All of all: Without modify the source code. With low overhead.
17 Our Contribution: Preliminary concepts Aspect Oriented Programming: Allows to isolate the main business logic of the application from secondary functions like logs or authentication. The core of AOP: Aspects. Aspects are composed by: Advices and Join Points. AOP allows to inject code in compile, load or runtime without to know the source code. We are injecting our observers using AOP
18 Our Contribution: Preliminary concepts Java Management Extensions: a set of capabilities to manage and monitor any system component: from devices to Java objects is based on a 3-level architecture: Probe level, Agent level and Remote Management Level.
19 Our Contribution: Architecture Aspect Component (AC) Associated to every application component. Manage the measurements of resource consumed and the trend. Aspect Component Proxy (AC-Proxy). creates a communication channel between the AC and the JMX Manager Agent JMX Monitoring Agents Access to the OS and collect system metrics for every component. JMX Manager Agent has the responsibility to collect the metrics of each component and build the resource-component map. Activate and deactivate ACs on demand. External Front-end allow administrators to communicate with the JMX Manager Agent in real time or activate new ACs or new JMX Monitor Agents.
20 Our Contribution: Architecture
21 Our Contribution: Root cause determination strategy The JMX Manager Agent has a responsibility to build resource-component map: The map is based on two axis: Component usage Resource consumption The map helps the engineers to priorize component repair
22 Our Contribution: Root cause determination strategy Component Usage Low Less Suspicious Component high Resource Consumption low Resource Consumption More Suspicious Component Component Usage High
23 Experimental Case Study We have used TPC-W J2EE application to evaluate of our approach. TPC-W simulates a on-line book store and uses Emulated Browsers (EBs) to simulate clients. The EBs calculate a thinking time to simulate the time used by a human to decide what will be his next step in the web. We have modified a set of TPC-W servlets to inject memory leaks at different ratios.
24 Experimental Case Study Overhead measurement: Around 5% of overhead.
25 Experimental Case Study Effectiveness to determine a memory leak: Only one component injects a memory leak (100Kb every injection):
26 Experimental Case Study Effectiveness to determine a memory leak: Four components inject a memory leak (100Kb every injection):
27 Experimental Case Study The map built in the last experiment was:
28 Experimental Case Study Effectiveness to determine a memory leak: Four components inject a memory leak (A = 100Kb every injection, B = 10KB, C and D = 1MB): A B C D
29 Experimental Case Study The map built in the last experiment was: Component Usage Low D high Resource Consumption low Resource Consumption C B A Component Usage High
30 Conclusion & Future work We have presented our framework and its utility and effectiveness to help to determine the root cause failure. We have focused on one type of software aging: memory leaks. The resource-component consumption could be an useful tool to help to determine the riskiest component We have to evaluate the effectiveness of that approach to determine other type of software aging due to different resources or even an interaction of more than one resource.
31 J2EE Instrumentation for software aging root cause application component determination with AspectJ Javier Alonso Josep Ll. Berral Ricard Gavaldà Jordi Torres Technical University of Catalonia, Spain
Adaptive on-line software aging prediction based on Machine Learning
Adaptive on-line software aging prediction based on Machine Learning Javier Alonso and Jordi Torres Barcelona Supercomputing Center Dept. of Computer Architecture Technical University of Catalonia {alonso,torres}@ac.upc.edu
More informationORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE
ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE Most application performance problems surface during peak loads. Often times, these problems are time and resource intensive,
More informationRecovering Device Drivers
1 Recovering Device Drivers Michael M. Swift, Muthukaruppan Annamalai, Brian N. Bershad, and Henry M. Levy University of Washington Presenter: Hayun Lee Embedded Software Lab. Symposium on Operating Systems
More informationCauses of Software Failures
Causes of Software Failures Hardware Faults Permanent faults, e.g., wear-and-tear component Transient faults, e.g., bit flips due to radiation Software Faults (Bugs) (40% failures) Nondeterministic bugs,
More informationReliability-Based Software Rejuvenation Scheduling for Cloud-Based Systems
27th International Conference on Software Engineering and Knowledge Engineering Reliability-Based Software Rejuvenation Scheduling for Cloud-Based Systems Jean Rahme and Haiping Xu Computer and Information
More informationAppDynamics Lite vs. Pro Edition
An AppDynamics Datasheet AppDynamics Lite vs. Pro Edition AppDynamics, the leader in application performance management (APM) for the cloud generation, offers both a Lite and Pro edition of its monitoring
More informationTUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS
TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3
More informationSeparating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington
Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems Robert Grimm University of Washington Extensions Added to running system Interact through low-latency interfaces Form
More informationOn the Way to ROC-2 (JAGR: JBoss + App-Generic Recovery)
On the Way to ROC-2 (JAGR: JBoss + App-Generic Recovery) George Candea and many others Stanford + Berkeley Outline J2EE and JBoss JBoss Additions JAGR µreboots Automatic Failure-Path Inference Self-Recovery
More informationSilk Performance Manager Installation and Setup Help
Silk Performance Manager 18.5 Installation and Setup Help Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright 2004-2017 Micro Focus. All rights reserved.
More informationNooks. Robert Grimm New York University
Nooks Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? Design and Implementation Nooks Overview An isolation
More informationTesting Error Handling Code in Device Drivers Using Characteristic Fault Injection
1 Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection Jia-Ju Bai, Yu-Ping Wang, Jie Yin, Shi-Min Hu Department of Computer Science and Technology Tsinghua University Beijing,
More informationHARDFS: Hardening HDFS with Selective and Lightweight Versioning
HARDFS: Hardening HDFS with Selective and Lightweight Versioning Thanh Do, Tyler Harter, Yingchao Liu, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau Haryadi S. Gunawi 1 Cloud Reliability q Cloud
More informationWhat You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices Marius Muench 1 Jan Stijohann 2,3 Frank Kargl 3 Aurélien Francillon 1 Davide Balzarotti 1 1 EURECOM 2 Siemens AG 3 Ulm University
More informationDistributed Diagnosis of Failures in a Three Tier E-Commerce System. Motivation
Distributed Diagnosis of Failures in a Three Tier E-ommerce System Gunjan Khanna, Ignacio Laguna, Fahad A. Arshad, and Saurabh agchi Dependable omputing Systems Lab (DSL) School of Electrical and omputer
More informationAdvanced Memory Management
Advanced Memory Management Main Points Applications of memory management What can we do with ability to trap on memory references to individual pages? File systems and persistent storage Goals Abstractions
More informationOracle Java SE Advanced for ISVs
Oracle Java SE Advanced for ISVs Oracle Java SE Advanced for ISVs is designed to enhance the Java based solutions that ISVs are providing to their enterprise customers. It brings together industry leading
More informationVirtuozzo Containers
Parallels Virtuozzo Containers White Paper An Introduction to Operating System Virtualization and Parallels Containers www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3
More informationTolerating Hardware Device Failures in Software. Asim Kadav, Matthew J. Renzelmann, Michael M. Swift University of Wisconsin Madison
Tolerating Hardware Device Failures in Software Asim Kadav, Matthew J. Renzelmann, Michael M. Swift University of Wisconsin Madison Current state of OS hardware interaction Many device drivers assume device
More informationOracle Database 10g The Self-Managing Database
Oracle Database 10g The Self-Managing Database Benoit Dageville Oracle Corporation benoit.dageville@oracle.com Page 1 1 Agenda Oracle10g: Oracle s first generation of self-managing database Oracle s Approach
More informationDependable Grid Services: A Case Study with OGSA-DAI
Dependable Grid Services: A Case Study with OGSA-DAI Javier Alonso, Jordi Torres {alonso, torres}@ac.upc.edu Technical Univ. of Catalonia - Barcelona Supercomputing Center Barcelona - Spain Luis Moura
More informationVertical Profiling: Understanding the Behavior of Object-Oriented Applications
Vertical Profiling: Understanding the Behavior of Object-Oriented Applications Matthias Hauswirth, Amer Diwan University of Colorado at Boulder Peter F. Sweeney, Michael Hind IBM Thomas J. Watson Research
More informationOracle Developer Studio Code Analyzer
Oracle Developer Studio Code Analyzer The Oracle Developer Studio Code Analyzer ensures application reliability and security by detecting application vulnerabilities, including memory leaks and memory
More informationCombined Server Rejuvenation in a Virtualized Data Center
Combined Server Rejuvenation in a Virtualized Data Center Fumio Machida, Jianwen Xiang, Kumiko Tadano, and Yoshiharu Maeno NEC Knowledge Discovery Research Laboratories Kawasaki, Japan {f-machida@ab, j-xiang@ah,
More informationFAULT TOLERANT SYSTEMS
FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 14 - Software Fault Tolerance I Chapter 4 Software Fault Tolerance Part.14.1 Causes of Software Errors Designing and
More informationDEPENDABLE GRID SERVICES: A CASE STUDY WITH OGSA-DAI
DEPENDABLE GRID SERVICES: A CASE STUDY WITH OGSA-DAI Javier Alonso and Jordi Torres Technical University of Catalonia Barcelona Supercomputing Center, Barcelona,Spain alonso@ac.upc.edu torres@ac.upc.edu
More informationSynopsis by: Stephen Roberts, GMU CS 895, Spring 2013
Using Components for Architecture-Based Management The Self-Repair case Sylvain Sicard Université Joseph Fourier, Grenoble, France, Fabienne Boyer Université Joseph Fourier, Grenoble, France, Noel De Palma
More informationCSE 124: Networked Services Lecture-15
Fall 2010 CSE 124: Networked Services Lecture-15 Instructor: B. S. Manoj, Ph.D http://cseweb.ucsd.edu/classes/fa10/cse124 11/18/2010 CSE 124 Networked Services Fall 2010 1 Updates Signup sheet for PlanetLab
More informationAuthors : Ruslan Nikolaev Godmar Back Presented in SOSP 13 on Nov 3-6, 2013
VirtuOS: An operating sytem with kernel virtualization Authors : Ruslan Nikolaev Godmar Back Presented in SOSP 13 on Nov 3-6, 2013 Presentation by Bien Aime MUGABARIGIRA Process Isolation and protection
More informationCISCO IOS WARM RELOAD & WARM UPGRADE
CISCO IOS WARM RELOAD & WARM UPGRADE INTERNET TECHNOLOGIES DIVISION SEPTEMBER 2004 1 High Availability Business depends on anywhere, anytime access to the systems, data, and applications Customers cite
More informationCost-Based Automatic Recovery Policy in Data Centers
Cost-Based Automatic Recovery Policy in Data Centers by Yi Luo A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Applied Science in Electrical
More informationPlasmon Diamond Library Manager
Plasmon Diamond Library Manager Release Details Product Release Notes Release Name: Diamond Library Manager Release Note Number: Note091 Release Version: 2.09.31 Release Date: 1 st July 2005 Release Type:
More informationBarry D. Lamkin Executive IT Specialist Capitalware's MQ Technical Conference v
What happened to my Transaction? Barry D. Lamkin Executive IT Specialist blamkin@us.ibm.com Transaction Tracking - APM Transaction Tracking is a major part of Application Performance Monitoring To ensure
More informationProject 0: Implementing a Hash Table
Project : Implementing a Hash Table CS, Big Data Systems, Spring Goal and Motivation. The goal of Project is to help you refresh basic skills at designing and implementing data structures and algorithms.
More informationArcGIS Server Performance and Scalability : Optimizing GIS Services
Esri International User Conference San Diego, CA Technical Workshops July 12, 2011 ArcGIS Server Performance and Scalability : Optimizing GIS Services David Cordes, Eric Miller Poll the Audience: Role
More informationExploiting IT Log Analytics to Find and Fix Problems Before They Become Outages
Exploiting IT Log Analytics to Find and Fix Problems Before They Become Outages Clyde Richardson (richarcl@us.ibm.com) Technical Sales Specialist Sarah Knowles (seli@us.ibm.com) Strategy and Portfolio
More informationJiST Java in Simulation Time An efficient, unifying approach to simulation using virtual machines
JiST Java in Simulation Time An efficient, unifying approach to simulation using virtual machines Rimon Barr, Zygmunt Haas, Robbert van Renesse rimon@acm.org haas@ece.cornell.edu rvr@cs.cornell.edu. Cornell
More informationTechnical Brief. A Checklist for Every API Call. Managing the Complete API Lifecycle
Technical Brief A Checklist for Table of Contents Introduction: The API Lifecycle 2 3 Security professionals API developers Operations engineers API product or business owners Apigee Edge 7 A Checklist
More informationSoftware Error Early Detection System based on Run-time Statistical Analysis of Function Return Values
Software Error Early Detection System based on Run-time Statistical Analysis of Function Return Values Alex Depoutovitch and Michael Stumm Department of Computer Science, Department Electrical and Computer
More information2. PICTURE: Cut and paste from paper
File System Layout 1. QUESTION: What were technology trends enabling this? a. CPU speeds getting faster relative to disk i. QUESTION: What is implication? Can do more work per disk block to make good decisions
More informationMemRed: Towards Reliable Web Applications
MemRed: Towards Reliable Web Applications Masoomeh Rudafshani University of Waterloo mrudafsh@uwaterloo.ca Paul A.S. Ward University of Waterloo pasward@uwaterloo.ca Bernard Wong University of Waterloo
More informationMonitoring the eg Manager. eg Enterprise v6
Monitoring the eg Manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationService Delivery Platform
Solution Brief Service Delivery Platform Enabling the transition to high-value and more differentiated network services with new consumption models for deploying VNFs. Keeping Up With Cloud Expectations
More information4 Effective Tools for Docker Monitoring. By Ranvijay Jamwal
4 Effective Tools for Docker Monitoring By Ranvijay Jamwal CONTENT 1. The need for Container Technologies 2. Introduction to Docker 2.1. What is Docker? 2.2. Why is Docker popular? 2.3. How does a Docker
More informationPort Tapping Session 2 Race tune your infrastructure
Port Tapping Session 2 Race tune your infrastructure Born on Oct 30 th 2012. 2 3 Tap Module Red adapter indicates TAP port 4 Corning Fibre Channel and Ethernet Tap s 72 Ports per 1U 288 Ports per 4U 5
More informationAgilent 53210A 350 MHz RF Counter Agilent 53220A 350 MHz Universal Frequency Counter/Timer Agilent 53230A 350 MHz Universal Frequency Counter/Timer
Agilent 53210A 350 MHz RF Counter Agilent 53220A 350 MHz Universal Frequency Counter/Timer Agilent 53230A 350 MHz Universal Frequency Counter/Timer Firmware Update 2.01 Release Notes 53210A/53220A/53230A
More informationDifferentiated Quality of Service for e-commerce Applications through Connection Scheduling based on System-Level Thread Priorities
Differentiated Quality of Service for e-commerce Applications through Connection Scheduling based on System-Level Thread Priorities Javier Alonso alonso@ac.upc.edu Jordi Guitart jguitart@ac.upc.edu Jordi
More informationsfcb Small Footprint Cim Broker Introduction
sfcb Small Footprint Cim Broker Introduction Adrian Schuur schuur@de.ibm.com May 2005 LTC Systems Management 2 Contents Simple questions: Why? What? How? A Picture and Terminology used Detailed description
More informationManageEngine Applications Manager 9. Product Features
ManageEngine Applications Manager 9 Product Features Applications Manager - The Solution Applications Manager Monitors your entire IT infrastructure including applications, servers, databases, operating
More informationRELEASE NOTES FOR THE Kinetic - Edge & Fog Processing Module (EFM) RELEASE 1.2.0
RELEASE NOTES FOR THE Kinetic - Edge & Fog Processing Module (EFM) RELEASE 1.2.0 Revised: November 30, 2017 These release notes provide a high-level product overview for the Cisco Kinetic - Edge & Fog
More informationAdventNet ManageEngine. Business Specific Application Management Solutions
AdventNet ManageEngine. Business Specific Application Management Solutions Levels of Application Management Business/application Specific Management Information Business Oriented Management Application
More informationMonitoring and Managing Computer Resource Usage on OSGi Frameworks
Monitoring and Managing Computer Resource Usage on OSGi Frameworks Ikuo YAMASAKI Research Engineer NTT Cyber Solution Laboratories Background: Service Aggregation Platform Operation Center and Home Service
More informationAspects and Soar: A Behavior Development Model. Jacob Crossman
Aspects and Soar: A Behavior Development Model Jacob Crossman jcrossman@soartech.com Motivation: Why is Soar Useful? Soar Systems are often complex Often require multiple processes Are built of hundreds/thousands
More informationIMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE
IMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE Application Note Abstract Alcatel-Lucent has established a partnership with NetworkMining
More informationUnifying Agent and Component Concepts - Jadex Active Components
Unifying Agent and Component Concepts - Jadex Active Components Alexander Pokahr, Lars Braubach, Kai Jander Distributed Systems and Information Systems Group (VSIS) Department of Informatics, University
More informationPerformance Evaluation of Virtualization Technologies
Performance Evaluation of Virtualization Technologies Saad Arif Dept. of Electrical Engineering and Computer Science University of Central Florida - Orlando, FL September 19, 2013 1 Introduction 1 Introduction
More informationAdaptive Instrumentation of Java-Applications for Experiment-Based Performance Analysis
Adaptive Instrumentation of Java-Applications for Experiment-Based Performance Analysis Henning Schulz, Albert Flaig, Alexander Wert and André van Hoorn Symposium on Software Performance 2014 28.11.2014
More informationA Practical Approach to Balancing Application Performance and Instrumentation Information Using Symantec i 3 for J2EE
WHITE PAPER: APPLICATION CUSTOMIZE PERFORMANCE MANAGEMENT Confidence in a connected world. A Practical Approach to Balancing Application Performance and Instrumentation Information Using Symantec i 3 for
More informationAnalysis of Derby Performance
Analysis of Derby Performance Staff Engineer Olav Sandstå Senior Engineer Dyre Tjeldvoll Sun Microsystems Database Technology Group This is a draft version that is subject to change. The authors can be
More informationORACLE WEBLOGIC SERVER 10g R3 ENTERPRISE EDITION
ORACLE WEBLOGIC SERVER 10g R3 ENTERPRISE EDITION KEY FEATURES FEATURES High performance clustering and failover capabilities Low-overhead Java application monitoring and diagnostics Flexible download and
More informationInside WebSphere Application Server
Inside WebSphere Application Server The anatomy of WebSphere Application Server is quite detailed so, for now, let's briefly outline some of the more important parts. The following diagram shows the basic
More informationPerformance Metrics for.net: Application Defender
White Paper Security Performance Metrics for.net: Application Defender Table of Contents page Abstract... 1 Results... 4 Abstract For every IT person, understanding the performance impact of adding a new
More informationHP Business Service Management
HP Business Service Management Software Version: 9.26 Getting Started With BPM - Best Practices Document Release Date: September 2015 Software Release Date: September 2015 Legal Notices Warranty The only
More informationJ2EE DIAGNOSING J2EE PERFORMANCE PROBLEMS THROUGHOUT THE APPLICATION LIFECYCLE
DIAGNOSING J2EE PERFORMANCE PROBLEMS THROUGHOUT THE APPLICATION LIFECYCLE ABSTRACT Many large-scale, complex enterprise applications are now built and deployed using the J2EE architecture. However, many
More informationUnified Management for Virtual Storage
Unified Management for Virtual Storage Storage Virtualization Automated Information Supply Chains Contribute to the Information Explosion Zettabytes Information doubling every 18-24 months Storage growing
More informationPortland State University ECE 587/687. Virtual Memory and Virtualization
Portland State University ECE 587/687 Virtual Memory and Virtualization Copyright by Alaa Alameldeen and Zeshan Chishti, 2015 Virtual Memory A layer of abstraction between applications and hardware Programs
More informationDiagnostics in Testing and Performance Engineering
Diagnostics in Testing and Performance Engineering This document talks about importance of diagnostics in application testing and performance engineering space. Here are some of the diagnostics best practices
More informationCrestron RL Release Notes
Page 1 of 8 Crestron RL Release Notes Crestron RL Version History Version 15.11.00 Version 15.10.00 Version 15.09 Version 15.08 Version 15.05 Version 15.04 Version 15.03 Version 15.02 Version 15.11.00
More informationAutonomic Web-based Simulation
Autonomic Web-based Simulation Yingping Huang and Gregory Madey Computer Science and Engineering University of Notre Dame Autonomic Web-based Simulation p.1/38 Autonomic Web-based Simulation Autonomic
More informationRelease Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7
Release Notes for Epilog for Windows v1.7 InterSect Alliance International Pty Ltd Page 1 of 16 About this document This document provides release notes for Snare Enterprise Epilog for Windows release.
More informationSpeculative Synchronization: Applying Thread Level Speculation to Parallel Applications. University of Illinois
Speculative Synchronization: Applying Thread Level Speculation to Parallel Applications José éf. Martínez * and Josep Torrellas University of Illinois ASPLOS 2002 * Now at Cornell University Overview Allow
More informationP17 System Testing Monday, September 24, 2007
IBM Software Group P17 System Testing Monday, September 24, 2007 Module 8 : IBM Rational Testing Solutions Marty Swafford IBM Rational Software IBM Certified Solution Designer - Rational Manual Tester,
More informationUndermining Information Hiding (And What to do About it)
Undermining Information Hiding (And What to do About it) Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos Overview Mitigating
More informationUnderstanding, Analyzing and Forecasting Capacity First Published On: Last Updated On:
Understanding, Analyzing and Forecasting Capacity First Published On: 04-19-2017 Last Updated On: 04-19-2017 1 Table of Contents 1. Analyzing and Forecasting 1.1.vROps - Reclaimable Capacity Analysis Badge
More informationEssential Features of an Integration Solution
Essential Features of an Integration Solution September 2017 WHITE PAPER Essential Features of an Integration Solution When an enterprise uses multiple applications, it needs to connect them for a variety
More informationQuest Central for DB2
Quest Central for DB2 INTEGRATED DATABASE MANAGEMENT TOOLS Supports DB2 running on Windows, Unix, OS/2, OS/390 and z/os Integrated database management components are designed for superior functionality
More informationProject 0: Implementing a Hash Table
CS: DATA SYSTEMS Project : Implementing a Hash Table CS, Data Systems, Fall Goal and Motivation. The goal of Project is to help you develop (or refresh) basic skills at designing and implementing data
More informationOperating Systems. File Systems. Thomas Ropars.
1 Operating Systems File Systems Thomas Ropars thomas.ropars@univ-grenoble-alpes.fr 2017 2 References The content of these lectures is inspired by: The lecture notes of Prof. David Mazières. Operating
More informationGlassFish Monitoring with JMX, Jconsole, Glassbox and AMX
GlassFish Monitoring with JMX, Jconsole, Glassbox and AMX Sun Community Days Sydney, Australia 06 March 2008 Chris Fleischmann Sun Microsystems, Inc. 1 Agenda GlassFish Monitoring OOTB JConsole and JMX
More informationModule 4 STORAGE NETWORK BACKUP & RECOVERY
Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup,
More informationWEB-CAT. Exploring Trends and Student Behaviors from Data Collected on an Automated Grading and Testing System
Exploring Trends and Student Behaviors from Data Collected on an Automated Grading and Testing System WEB-CAT Tony Allevato, Stephen Edwards allevato@vt.edu, edwards@cs.vt.edu Virginia Tech Department
More informationVERIFYING SOFTWARE ROBUSTNESS. Ross Collard Collard & Company
VERIFYING SOFTWARE ROBUSTNESS Ross Collard Collard & Company OVERVIEW Software is robust if it can tolerate such problems as unanticipated events, invalid inputs, corrupted internally stored data, improper
More informationAppendix D: Storage Systems
Appendix D: Storage Systems Instructor: Josep Torrellas CS433 Copyright Josep Torrellas 1999, 2001, 2002, 2013 1 Storage Systems : Disks Used for long term storage of files temporarily store parts of pgm
More informationDesigning API: 20 API Paradoxes. Jaroslav Tulach NetBeans Platform Architect
Designing API: 20 API Paradoxes Jaroslav Tulach NetBeans Platform Architect Motto Just like there is a difference between describing a house and describing a Universe, there is a difference between writing
More informationGetting it Right: Testing Storage Arrays The Way They ll be Used
Getting it Right: Testing Storage Arrays The Way They ll be Used Peter Murray Virtual Instruments Flash Memory Summit 2017 Santa Clara, CA 1 The Journey: How Did we Get Here? Storage testing was black
More informationAvailability & Resource
Achieving Cost-effective High Availability & Resource Management Agenda Virtual Infrastructure Stack How Vmware helps in the Data Center Availability and Resource Management 2 The VMware Virtual Infrastructure
More informationHelp your Cisco customers defend against downtime and reduce costs
Help your Cisco customers defend against downtime and reduce costs Why and when to sell Eaton Power Management solutions Incorporating power management with Cisco solutions boosts your sales revenue, while
More informationResilient Virtualized Systems Using ReHype
UCLA Computer Science Department Technical Report #140019 University of California, Los Angeles, October 2014. Resilient Virtualized Systems Using ReHype Michael Le and Yuval Tamir Concurrent Systems Laboratory
More informationInternet Services and Search Engines. Amin Vahdat CSE 123b May 2, 2006
Internet Services and Search Engines Amin Vahdat CSE 123b May 2, 2006 Midterm: May 9 Annoucements Second assignment due May 15 Lessons from Giant-Scale Services Service Replication Service Partitioning
More informationFault-Tolerant Storage and Implications for the Cloud Charles Snyder
Fault-Tolerant Storage and Implications for the Cloud Charles Snyder Abstract Fault-tolerance is an essential aspect of any storage system data must be correctly preserved and transmitted in order to be
More informationTHE phenomenon that the state of running software
TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 1 Fast Software Rejuvenation of Virtual Machine Monitors Kenichi Kourai, Member, IEEE Computer Society, and Shigeru Chiba Abstract As server consolidation
More informationTechnical Improvements and future directions for ecollection and multimodal data capture in the Australian Bureau of Statistics (ABS)
Technical Improvements and future directions for ecollection and multimodal data capture in the Australian Bureau of Statistics (ABS) Monica Kempster Assistant Director Blaise Operations Manager Technical
More informationCISQ Weakness Descriptions
CISQ Weakness Descriptions This document presents descriptions of the 86 weaknesses contained in the 4 CISQ Quality Characteristic measures. These descriptions have been simplified from their description
More informationHow To Keep Your Head Above Water While Detecting Errors
USENIX / ACM / IFIP 10th International Middleware Conference How To Keep Your Head Above Water While Detecting Errors Ignacio Laguna, Fahad A. Arshad, David M. Grothe, Saurabh Bagchi Dependable Computing
More informationA Fast Rejuvenation Technique for Server Consolidation with Virtual Machines
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines Kenichi Kourai Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8552, Japan kourai@is.titech.ac.jp Shigeru
More informationMEMBRANE: OPERATING SYSTEM SUPPORT FOR RESTARTABLE FILE SYSTEMS
Department of Computer Science Institute of System Architecture, Operating Systems Group MEMBRANE: OPERATING SYSTEM SUPPORT FOR RESTARTABLE FILE SYSTEMS SWAMINATHAN SUNDARARAMAN, SRIRAM SUBRAMANIAN, ABHISHEK
More informationMemory management. the CPU cannot be divided into smaller pieces and has to be given to a process as one unit (sharing is solely temporal).
Memory management It is possible to assign a separate memory chip to each process in the system, if the number of processes is small enough. This is not a cost effective way to spend money: as the number
More information6.033 Lecture Fault Tolerant Computing 3/31/2014
6.033 Lecture 14 -- Fault Tolerant Computing 3/31/2014 So far what have we seen: Modularity RPC Processes Client / server Networking Implements client/server Seen a few examples of dealing with faults
More informationSwapping. Operating Systems I. Swapping. Motivation. Paging Implementation. Demand Paging. Active processes use more physical memory than system has
Swapping Active processes use more physical memory than system has Operating Systems I Address Binding can be fixed or relocatable at runtime Swap out P P Virtual Memory OS Backing Store (Swap Space) Main
More informationAlwaysOn Availability Groups: Backups, Restores, and CHECKDB
AlwaysOn Availability Groups: Backups, Restores, and CHECKDB www.brentozar.com sp_blitz sp_blitzfirst email newsletter videos SQL Critical Care 2016 Brent Ozar Unlimited. All rights reserved. 1 What I
More information